1
Published 2011
British Informatics Society
Table of Contents: ... are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot...

2
by Abdel-Hamid, Ahmed, Andrews, Scott, Arsanjani, Ali
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Mobile computing / Security measures...

3
by Kite, Robert
Published 2010
Peachpit Press
Subjects: ...Macintosh (Computer) / Security measures / blmlsh...

4
by Thiel, David
Published 2016
No Starch Press
Table of Contents: ... This Book Is Structured ; Conventions This Book Follows ; A Note on Swift ; Mobile Security Promises...

5
by Mahalik, Heather, Bommisetty, Satish, Tamma, Rohit
Published 2016
Packt Publishing
Subjects: ...Mobile computing / Security measures...

6
by Hoog, Andrew
Published 2011
Syngress
Table of Contents: ...Chapter 1 Android and Mobile Forensics Chapter 2 Android Hardware Platforms Chapter 3 Android...

7
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

8
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

9
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

10
by Kotipalli, Srinivasa Rao, Imran, Mohammed A.
Published 2016
Packt Publishing
Table of Contents: ... -- Threats at the client side -- Threats at the backend -- Guidelines for testing and securing mobile apps...

11
by Tiepolo, Gianluca
Published 2022
Packt Publishing
Subjects: ...Mobile computing / Security measures...

12
by Tiepolo, Gianluca
Published 2022
Packt Publishing, Limited
Subjects: ...Mobile computing / Security measures...

13
by Gajjar, Manish J.
Published 2017
Morgan Kaufmann is an imprint of Elsevier
Table of Contents: ... Faced by Mobile Computing Systems; Resource Poor; Less Secured/Reliable; Intermittent Connectivity...

14 Subjects: ...Image processing / Security measures...

15
by Samani, Raj, Honan, Brian, Reavis, Jim
Published 2015
Syngress
Table of Contents: ... CLOUD THREATS; END NOTES; Chapter 4 -- Secure Cloud for Mobile Computing; MOBILE TOP THREATS: EVIL 8.0...

16
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19...

17
Published 2017
O'Reilly Media, Inc.
Subjects: ...Operating systems (Computers) / Security measures / fast...

18
by Ruan, Xiaoyu
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... on Today's Foundation -- Isolated Computing Environment -- Security-Hardening Measures -- Basic Utilities...

19 Table of Contents: ... Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs...

20
by DeFranco, Joanna F., Maley, Bob
Published 2022
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...